The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions (ADT3).
{
"binaries": [
{
"binary_name": "libapache2-mod-svn",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "libapache2-svn",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "libsvn-dev",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "libsvn-doc",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "libsvn-java",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "libsvn-perl",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "libsvn-ruby1.8",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "libsvn1",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "python-subversion",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "python-subversion-dbg",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "ruby-svn",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "subversion",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "subversion-dbg",
"binary_version": "1.8.8-1ubuntu3"
},
{
"binary_name": "subversion-tools",
"binary_version": "1.8.8-1ubuntu3"
}
],
"availability": "No subscription required"
}